ADMIRAL A. I. NEPENIN: FATHER OF MODERN
RUSSIAN NAVAL INTELLIGENCE (U) J
THE CRYPT BUG (U) |. . .
USER-FRIENDLY WRITING (U)
NATIONAL SUPERCOMPUTING RESEARCH CENTER
SHELL GAME: TIME SHELLS (U) W.E.S J.IL
NSA-CROSTIC NO. 53 .David H. Williams,
AUTOMATED INFORMATION SECURITY (U) \
CRYPTOLOG 1983 INDEX (U) .
k & H S
P.L. 86-36
: ied and Approved for Release
CID : 4009895
Published by Pi, Techniques and Standards
VOL. XI, No. 2-3
FEBRUARY-MARCH 1984
PUBLISHER
BOARD OF EDITORS
Editor r
Asst. Editor ... C
Production . . |_
1 (963-3045s)
□(963-11038)
J (96 3-3369 s)
Collection |_
Computer Security
](963-3961s)
Crvptolinguistics . 1 ~
Data Systems ^
5
Information Science
(859-6044)
963-1103s)
] (963-4953s)
|l (963-371 Is)
Mathematics 7 ] (968-8518s)
Puzzles UdVid H. WUll&AS-r (963f 1103s)
Special Research Vera R. Filby ; (968-7119s)
Traffic Analysis .. Robert J. Hanyok^i (966-8418s)
Editorial
As an agency , we live today on yesterday *s
discoveries . Today* s output, which pays the
bills around here, is based largely upon
technical breakthroughs made sometime in the
past . Most of our people are working to pro-
duce today *s results, but here and there,
mostly in back rooms, there are a few scat-
tered people doing the " discovery " work . We
used to call them "break-in artists . ■ They are
busy making tomorrow* s production possible
and, in a very real sense, making it possible
for tomorrow* s bills to be paid .
Once in a while, one runs across d whole
cluster of this discovery work . It is jas if a
renaissance had broken out in one particular
shop . A whole group of people seem to be bub-
bling over with invention, intuition, anti
di scovery. It is an exciting place to be,
when it happens .
For subscriptions =:
send n ame and organi zation
to; | | ,P14 f
P.L. 86-36
To submit articles or letters
by mail, to: Pi, Cryptolog
via PLATFORM mail, send to:
cryptolg at barlc05
(bar-one-c-zero-f ive)
(note: no r O f in *log*)
There used to be one or two managers who
seemed to have such a renaissance around them
wherever they went. They seemed to have the
knack of creating an atmosphere that fostered
discovery, that encouraged breakthroughs .
I can remember studying those managers, to
see if I could emulate their evident ability
to stimulate the discovery process . I can
remember going to management courses and read-
ing various books on the latest fads in
management styles , looking for clues about how
to generate the atmosphere that discovery and
creativity seem to need. / can't remember
finding much that was useful ; it seemed to be
easier to talk about things that were easier
to count or measure .
Contents of Cryptolog should not be repro-
duced, or further disseminated outside the
National Security Agency without the permis-
sion of the Publisher . Inquiries regarding
reproduction and dissemination should be
directed to the Editor.
For an outfit that depends so much on
break-in artists, we ought to worry about
finding, growing, and managing tomorrow's
crop . Perhaps we already are.
\5
4^1
F O R O FFICIAL USE ONLY
IOCID :
4009895
FOR OFFICIAL UOE OHLY
ADMIRAL A.I. NEPENIN:
FATHER OF
MODERN RUSSIAN
NAVAL INTELLIGENCE (U)
PvL. 86-36
he history of Russian military af-
W fairs has been one of incompetence
mixed with flashes of brilliance.
The brilliance has usually been in
the form of individual military
"shakers and movers 11 who have risen to the oc-
casion with determination and forcefulness to
carry through their goals , come what may, to
the end. One might include Marshals Suvorov
and Zhukov or Admirals Senyavin and Gorshkov
in this category. However, there is one indi-
vidual , although he is little known in the
West, who as a "shaker and mover" might be
said to be the father of modern Russian naval
intelligence: Admiral Adrian Ivanovich Nepe-
Nepenin, in his capacity as Chief of the
Baltic Fleet's Communications (and Intelli-
gence) Service both prior to and during World
War I, built the naval intelligence organiza-
tion into a formidable arm of the Russian Navy
and ultimately established roots which have
carried over into the Soviet era.
Adrian Ivanovich Nepenin was born 21 Oc-
tober 1871 in Pskov Province, Russia. He en-
tered the Russian Naval Academy in 1885 and
graduated in 1889. In 1898 he was assigned to
the Far East Fleet. In December 1904 Captain
2nd Rank Nepenin was assigned to command the
destroyer STOROZHEVOJ at Port Arthur. During
the war with Japan, Nepenin was captured and
spent the last part of that war as a POW in
Japan. Between 1905 and 1910 Nepenin held
various ship commands in the Baltic Fleet.
Originally prepared as an Appendix to the
author's article on "Communications Intel-
ligence and Tsarist Russia , ” which ap-
peared in the Jan 84 issue of Cryptolog .
In 1910, after much thought, Nepenin sent a
plan for reorganization of the Communications
and Observation Service of the Baltic Fleet
to Admiral Nikolaj Ottovich von Ehssen,
Coinmander-in-Chief, Baltic Fleet. Admiral von
Ehssen liked Nepenin 1 s energetic idea for the
Communications Service and in 1911 appointed
Nepenin as Chief of the Communications Ser-
vice. Nepenin probably made Captain 1st Rank
at this time.
Over the next few years, under Nepenin* s
guidance and direction, the Communicat ions
Service — almost alone within the Russian Navy
— achieved a high esprit de corps among all
its personnel. By October 1915 Nepenin had
achieved the rank of Rear Admiral for his ef-
forts. His admirers included not only his own
men but even foreign allies assigned to Russia
during the war. During a visit to a Communi-
cations Service airbase in the Baltic in 1916,
Admiral Sir Richard Phillimore (British Naval
Representative to Russian General Staff Head-
quarters, "STAVKA," 1915-16) was quoted as
telling the Communications Service officers
and men:
Feb 84 * CRYPT0L0G * Page 1
iOCID: 4009895
"Everything is excellent in our Brit-
ish Navy . . . except that we do not have
such an Admiral as your Nepenin who
knows everything."[l]
On 6 September 1916, largely on the basis
of his Communications Service record, Nepenin
was offered and accepted the command of the
Baltic Fleet along with the rank of Vice Ad-
miral. Nepenin' s time as CINC, however, was
brief with little opportunity to carry out his
ideas on reorganizing and revitalizing the
spirit of the Fleet. On 15 March 1917, while
on his way to meet with a group of disgruntles
sailors near the Helsingfors Railway Station,
Nepenin was killed by a shot from behind by
either a mutinous sailor (according to the So-
viet version) or a German agent dressed in the
uniform of a Baltic Fleet sailor (Russian
emigr£ version). [2]
Although Nepenin 1 s period on the stage of
History was brief, he left an indelible im-
print on the development of Russian naval in-
telligence in the 20th century.
FOOTNOTES
1. Apparently Sir Richard forgot (?) in his
remarks about Admiral Reginald "Blinker"
Hall of "Room 40 OB" fame,
2. Dudorov, Rear Admiral Boris Petrovich Du-
dorov in the emigr£ journal Morskie Za-
piski (The Naval Records), New York. See
also The Russian Navy in War and Revolu-
tion by G. K, Graf, Munich: R. Oldenburg,
1923, pp. 119-121, and The Russians at
Sea by David Woodward, London: William
Kimber, 1965, pp. 181-182. For the trad-
itional Soviet negative view of Nepenin
from 1916 as "suppressor of the Revolu-
tionary in the Baltic Fleet," see Pavlo-
vich, N. B. (editor), Flot v Pervoj Miro-
voj Vojne (The Navy in World War ITj 2
vols, Moscow: Voenizdat, 1964, Vol 1, p.
241.
! • cu)
P.L. 86-36
When all good folks are sound asleep.
And all the rest are counting sheep.
He concentrates on cipher text.
And contemplates ways mo9t complex
To render an approved solution
Of some obscure substitution.
While all the world is sleeping, snoring
Loud enough to rip the flooring.
He derives much satisfaction
From the spatial interaction
Of poly-graphic frequencies
And isomorphic sequences.
Of characters on paper slips
Better know as sliding strips.
Slides them West and tries the "Chi" test.
Slides them East and tries the "Phi" test,
Clamps his pipe tight in his mouth.
And grimly slides them North and South,
And if success eludes him then.
Tears them up and starts again.
Meanwhile the clock ticks on and on.
Until at long last comes the dawn.
As the milkman rattles by.
He is heard to heave a sigh.
Slowly piles the work sheets higher,
Calmly throws them on the fire.
Having proved one simple fact;
There can be do doubt of that —
As suspected all along,
Everything he did was wrong.
from Signal Corps Bulletin No. 109,
July-Dee ember 1940
Feb 84 * CRYPTOLOG * Page 2
OCID : 4009895
Human Factors
USER-FRIENDLY
WRITING (U)
P13
P . L . 86-36
e have seen and heard a lot lately
about our writing. Our Director has
made a special point of urging us to
write more clearly and directly. A
hard-hitting article on the same to-
pic may be found in the November 1983 issue of
CRYPTOLOG , pp. 13-18. A number of services
are available to help us improve our communi-
cation skills, including courses at the School
and the new "Write-Line.'* The quality and ef-
fectiveness of our writing and speaking is far
more important than many of us seem to real-
ize, in spite of these management initiatives.
Unfortunately, our writing will only get
better if we care about it and feel that it
matters. I am not going to launch into a long
article about good writing, or how to improve
our writing. That has been done already by
many others; I will mention two sources that I
have found particularly useful. But I feel
that good clear writing is an important human
factors issue, and I'd like to say a few
things about it in these Tech Notes.
I read a lot of technical papers and
research reports, and I edit my office's
Monthly Research Summaries. I am sorry to say
that I have seen a great deal of very bad
writing. It is bad because it is not "user-
friendly." I am going to direct my comments
to anyone out there who writes the kinds of
prose I have to fight my way through each
month in our Research Summary.
As a reader , I am a user of your paper or
report, just like a user of any other tool.
The paper probably says something I need to
know or I wouldn't have picked it up. If you
create long, intricate sentences choked with
jargon, you are putting major obstacles in my
way. You are making me spend far too much of
my time and energy to get your meaning. Some-
t imes your sentences are so complicated that
you lose your own way through them, so how can
you expect me, the reader, to understand them?
I know that you don't set out to mystify the
reader on purpose. I believe that scientific
and technical writers have certain basic
misconceptions about writing; some or all of
these they probably learn from their teachers
at colleges and technical schools, many of
whom are also apallingly bad writers. Let's
take a look at some of the faulty assumptions
that may give rise to the bad writing techni-
cal people so often produce.
"If I say it simply, people will think
I'm uneducated."
People in technical fields have gotten so
used to a certain very heavy, convoluted style
of writing that simpler writing just sounds
inappropriate and anticlimactic to them. Even
if they are just telling us that they debugged
a program or checked out some minor electronic
gadget, they feel they must sound like a can-
didate for the Nobel prize.
Feb 84 * CRYPTOLOG * Page 3
DOCID: 4009895
?
*
'•S ,
f
"If I say it simply, people won't know
it's important."
Many people seem to think that the length
of their words and the complexity of their
sentences are a direct measure of the impor-
tance of the topic. I "use" a Kleenex to blow
my nose, but I "utilize" the computer, because
the computer is a lot more expensive and im-
portant than a Kleenex or my nose! I might
"make it easier" for the cat to use the litter
box, but I feel I must "facilitate user acces-
sibility" to project X.
"If I say it simply, I won't be able to
hedge and fudge."
Technical and scientific people are masters
of the art of hedging their bets. To some ex-
tent, this is necessary and justified; we have
a professional obligation to specify the de-
gree of significance of a result , the relia-
bility of a statement, or the statistical con-
text of an event. We have to convey these
matters to our readers at those times and
places where they are important and appropri-
ate. Unfortunately, the hedging gets to be a
habit, so that it infects all our writing, and
shows up in lots of places where it serves no
purpose. ,1 suspect that the long sentences
starting out with endless strings of subordi-
nate clauses arise in this hedging habit.
Each subordinate clause is like a safe little
fence to push the bald, direct subject and
verb further away from the reader, until the
meaning disappears in a comfortable mist. I
have seen some cases where the subject and
main verb never arrive at all. In many cases,
the writer has forgotten whether the subject
was singular or plural, or even what the sub-
ject started out to be, by the time he gets to
the main verb. It's a real help to the reader
when you put the main subject and verb at or
near the beginning of the sentence. Don't get
into the habit of writing English as if it
were German!
A frequent error I see in technical writing
is the "dangling participle." The long string
of subordinate clauses at the beginning of the
sentence often starts with a participial
phrase that does not refer to the real subject
of the sentence. Strunk and White (reference
2 below) say, "A participial phrase at the be-
ginning of a sentence must refer to the gram-
matical subject." [p. 8] As the reference
states , sentences violating this rule are
often ludicrous, for example, "Being in a di-
lapidated condition, I was able to buy the
house very cheap." Even when they aren't rid-
iculous , dangling participles are confusing
and sloppy. This kind of writing doesn't im-
press a careful reader with the quality of the
writer' s thinking.
"My readers are all experts in my field
and know the jargon."
Perhaps this is true; if so, I think the
writer is making a mistake. What about
managers in other organizations that might
make use of his ideas? They may be familiar
with the field at a global level without know-
ing al 1 the buzzwords and abbreviations he
tosses off in his report. What about techni-
cal people in related fields? They may have a
similar problem with some of the jargon. Fi-
nally, I maintain that jargon and alphabet
soup are far too often a lazy substitute for
thinking. If we understand what we are doing,
we should be able to express it clearly with a
minimum of jargon. When I am talking to some-
one who throws a lot of alphabet soup and jar-
gon at me, I make a point of asking politely
for one or two definitions or expansions.
Very often, I get a blank look, a silence,
then "Well, gosh, now that you ask, I don't
know! "
Feb 84 * CRYPTOLOG * Page 4
CID : 4009895
FOR OFFICIAL USE OWL 1
"Oh, EVERYBODY knows what that means!"
The remarks in paragraph 4 apply to this
one too. I came across the phrase "reparti-
tioning the functionality" in a recent
research summary . I very much doubt that
"everybody" knows what that might mean, and
I'm sure that some simpler, clearer way could
have been found to express the idea, whatever
it was.
"If I simply say 'somebody did thus and
so,' I am leaving somebody's posterior
alarmingly uncovered."
We seem to think it is much safer for all
concerned to use the passive voice. Nobody
DID it. It just happened. It was done. That
also sounds much more impressive, like an act
of God: it rained, there was light. We've
also had it hammered into us throughout a
technical or scientific education that we must
always be "objective." The worst sin in the
world is to be "personal" or "subjective"!
That 1 s another reason why we avoid the active
voice like the plague and prefer passives or
impersonal constructions like "there were in-
dications that" and "it is apparent that."
These constructions make our sentences need-
lessly complicated right at the start: harder
for us to write, and harder for the reader to
read. At their worst, they can totally ob-
scure the meaning.
Here's a sample of user-unfriendly prose to
illustrate the needless syntactic tangles and
sloppy semantics of bad writing: "In addition
to examining the use of, and designing a
gadget for a fratnmus for project GLITCH, the
use of a widget for project FOO was also stu-
died." Exercise: find the subject of this
sentence . Here 1 s a better way of saying it :
"We designed a gadget for a frammus for pro-
ject GLITCH, and examined its use. We also
studied the use of a widget for project FOO."
I am still unhappy about the vagueness of
"studying the use" of gadgets and widgets.
Does the writer mean "try out the gadget to
see how useful it is"? Or does he mean "ob-
serve operators using the gadget and study how
they use it"? Maybe he means "perform various
experiments to see if there is any point in
trying to use the gadget . ” When we look
closely at this sentence, we see that it
doesn't convey much meaning to the reader un-
less he already knows all the intimate details
of the projects and equipment .
In closing, I'd like to stress one final
point: writing matters. It matters HOW some-
thing is expressed. Engineers and mathemati-
cians know that the formal systems they use
(mathematical and scientific notation, models,
and methods) are powerful tools. Computer
systems people hold up certain standards for
writing good code and for the efficient,
economical use of programming languages.
Technical people respect those tools and ap-
preciate the value of elegance and economy in
their use. Natural language is another tool,
just as powerful and deserving of respect.
Unfortunately, too many technical and scien-
tific workers tend to ignore or look down on
natural language. They don't think of English
as a tool that can and should be used with
elegance and skill . Their mathematics may be
beautiful, and their programs may be clear and
economical, but if their writing is messy
their minds are likely to be a bit messy too.
The exercise of stating something clearly and
directly in good plain English can often clear
up the mess for the writer as well as his
readers .
References
"Just Plain English," Department of English,
US Air Force Academy, Colorado 80840 (no
date) .
Strunk, W., Jr., and E. B. White, The Elements
of Style , New York, Macmillan, 1972
Feb 84 * CRYPTOLOG * Page 5
F O R OFFICIAL UOE ONLY
IDOCID : 4009895
National
Supercompute
Research
Center-
0
a
•
0
If flooo
IJfBJO
O o o
•
P.L. 86-36
Introduction
(U) A National Supercomputing Research
Center is important to NSA because it will
help us to solve many future supercomputing
problems . The word "super computing" simply
means the intelligent use of the mo9t powerful
computational tools currently available. Such
a center will probably solve these problems
better than we have done before and in a way
to help other national defense efforts as
well. It will do this with outside people and
outside money. But we need to fight for it.
Background
(U) The Chief Scientist of NSA, Mr. Kermith
Speierman, was asked by DIRNSA to formulate
NSA recommendations for DoD regarding super-
computer initiatives. The Speierman Committee
was formed to develop those recommendations
and reported to the Director in the autumn of
1983, urging four functions for a federal
supercomput ing initiative to help supercomput-
ing:
a. In-house , NSA : Highly classified special
projects ;
b. Defense Parallel Processing Laboratory
( DPPL ) : Medium-level classified work on
massively parallel processing for na-
tional security in the next decade;
c . NSRC : A largely unclassified lab for su-
percomputing hardware and software
research , with special emphasis on sup-
port of :
_d. Regional Computational Facilities (RCFs):
An unclassified program to provide super-
computer access to academic researchers.
(U) The in-house function is already being
performed and will continue. If no other ini-
tiatives are acted on, RCFs will be partially
done by the National Science Foundation (NSF)
and the Department of Energy (DoE) labora-
tories under existing plans . The really new
features are the DPPL and NSRC. But the DPPL
seems to be on its way to receiving accep-
tance. Therefore, this article is dedicated
solely to justifying the NSRC.
Feb 84 * CRYPTOLOG * Page 6
OCID : 4009895
A
-J
Possible Objections to the NSRC
(U) The major objections to a new* indepen-
dent NSRC are four:
The vendors typically supply poor operating
systems and FORTRAN . After all , operational
software is not their main interest and some-
thing really sophisticated is quite beyond
their current capability. The result is that
the users either get substandard performance
from their machines or have to develop new
opera t ing systems and languages , usually dif-
ferent from anybody else's.
(U) The DoE labs have developed their own
operating systems with a line editor and com-
plicated user commands that would be unsuit-
able for NSA. T he NSA supercomputing
environment — i.e., the l I svstem and IMP
language — is powerful and easy fo use. Yet it
cannot be the general super computing standard
for various technical reasons; In addition,
it is dif f icul t to trans fer to different
machines. If we soon have a wide variety of
supercompute rs, it wil l be impossible for us
to maintain I I lMP on / all without a
great increase in the number of systems pro-
grammers. UNIX/C may become the de_ facto
standard since it will boon i be available on
almost all supercomputers . However, we see it
as having inherent inefficiencies that make it
difficult to use the full power of the com-
puter when we wish to. D T
1. No need because of current open research;
2. The DoE labs could do this (and they want
to) ;
3 . An intense , open research program would
transfer information and technology to
the outer world; and
4. Suggestions for an NSRC would arouse op-
position from DoE or the President's Of-
fice of Science and Technology Policy
(OSTP) and thus possibly imperil the
whole initiative.
(U) I believe that objections 1 and 2 are
essentially false (as stated) and that 3 and 4
are true but can still be handled.
Objection 1
(U) One possible response is to put this
problem in the DPPL or keep it in NSA (by us-
ing more people). But the systems programming
problem is essentially unclassified . How much
better to free up NSAers and DPPLers for clas-
sified work and put systems software in the
NSRC, where it will be serving an independent
need anyway (support of the regional centers).
Driven by a variety of applications from
academia, with a few clever interns from the
labs and NSA bringing the best of their
methods, the NSRC could have a resounding suc-
cess. Specifically, they might well develop
once and for all a portable , easy, powerful
environment that could be used by all and
enhance the vendors' products at the same
time. And the really great thing is the lev-
erage we get by having this work done by other
people with others' money. Similar statements
could surely be made in the other areas of
NSRC emphasis besides languages and operating
systems ; i.e. , algorithms, hardware technol-
ogy , architecture, numerical analysis, artifi-
cial intelligence, and graphics.
(U) This objection is that no radically new
efforts in unclassified supercomputing
research are necessary because of existing
work in government, industry, and academia.
However , a look at specific examples (e.g. ,
operating systems and software) shows how
inadequate the current efforts really are.
Feb 84 * CRYPTOLOG * Page 7
DOCID: 4009895
Objection 2
(U) Los Alamos National Labs would dearly
love to have the functions of the NSRC. How-
ever, even a casual glance at their record
must produce skepticism inasmuch as:
[] they get relatively poor performance from
their Crays (the current standard super-
computers) ;
[] they have a clumsy operating system;
[] they discourage assembly language and
modern high-level languages; and
[] they have relatively few experts, partly
because they have not encouraged (as NSA
has) scientific personnel to become rela-
tively sophisticated.
(U) Maybe they will change if the labels on
their doors are changed, but I doubt it. And
I doubt that even "safeguards" written into
new terms of reference, or even a change of
location, would really change their modus
operand i . If Los Alamos gets the NSRC, then I
predict that the whole effort will be ir-
relevant to NSA and we will be back to having
to use many NSAers and DPPLers to do unclassi-
fied work.
Objection 3
(U) The Speierman federal initiative would
result in some information transfer to the
outside. However, since the outside world is
no longer very far behind us, the real ques-
tion is what will be the marginal increase in
harm (as opposed to what would happen anyway),
weighed against the potential benefits to us.
Since the in-house programming and the DPPL
are classified, the only threat comes from the
regional centers and the NSRC. The regional
centers should provide only computational ac-
cess at the end of a telephone line, and that
only by grant. Thus the foreign graduate stu-
dent in astrophysics could get time to study
galactic structure, but he could not dump
critical software, and he would have to break
the terms of his grant to study cryptography
on the sly. The NSRC itself should be physi-
cally restricted to US nationals since it will
have at least company proprietary, and possi-
bly classified, information. The problem with
the NSRC is that useful hardware and software
work will eventually become public. After
all, the people there will be developing very
powerful unclassified operating systems. My
contention is that the outside world is catch-
ing up anyway. It is far better to have them
trying to get up to the level of our unclassi-
fied base a few years after us than for us to
have an unclassified base behind that of other
countries and to try to build our classified
technology from it.
Objection 4
(U) If the NSRC is worth having, it's worth
fighting for . We should not regard it as a
political chip to be bargained away for DoE
support for the whole initiative. The best
approach is to keep trying to persuade the in-
terested part ies , especially DoE , that the
NSRC is in their best interest too. They also
will get leverage from having the NSRC solve
their problems.
Feb 84 * CRYPT0L0G * Page 8
OCID
4009895
SHELL
GAME
by WES
TIME
SHELLS [U]
m
Y ou may not have noticed , but the
time function on our UNIX systems
has been converted to GMT, or ZULU
time- The other day, the phone rang
and the voice at the other end said ,
"The boss would like to see you at 2 :45 to-
day." Since 1 was on the system and probably
would be for most of the day, I typed in
remind 2 :30
See boss at 2 :45
and finished with a control-D. Then, being a
cautious sort (remind has sometimes had a mind
of its own) , I typed in 'delrem' and looked at
what the system thought it was going to do.
By now you have guessed that the system,
operating in the time zone of the mythical
kingdom of ZULU, had stored away my **wake up
call 11 as 1430Z. So much for modern effi-
ciency.
Now 1 don't really mind using ZULU time,
but it's just three more things to remember:
the summer difference, the winter difference,
and which are we in right now. Frankly, I'm
still trying to remember all my PIN numbers
(how many bank cards do you have?), and all
the passwords to the various systems , and a
couple of door combinations, and... well you
get the idea. Every time I get another one of
these important things to remember, I forget
something trivial like a birthday or an an-
niversary.
So I went looking for some, way to get the
system to keep track for me. What I found
were two shells, one short and sweet, and the
other much more involved • Here is the first
one, called "tyrne" :
date "+%H 11 | » t
expr $t - 05 | » t
date "+TIME : ZULU ($t :%M ESI)"
What 1 hadn't realized was how much the
'date' program had changed since UNIX Version
6. Since Daylight Saving Time runs from the
last Sunday of April to the last Sunday of Oc-
tober, 1 added some commands and the shell now
looks like this :
date "+%m" | = a
date ,, +%d" | = b
date "+%w" | = c
expr $b - $c | - d
switch "$a"
: 'standard time'
= e S
- f 05
breaksw
'last Sunday in April change'
if $d -ge 24 then
« e D
- f 04
breaksw
else
* e S
* f 05
breaksw
end if
'daylight saving time'
Feb 84 * CRYPTOLOG * Page 9
DOCID: 4009895
: 09
= e D
= f 04
breaksw
; 'last Sunday in October change'
: 10
if $d -ge 25 then
= e S
= f 05
breaksw
else
= e D
= f 04
breaksw
end if
endsw
date "+%H" | = t
expr $t - $f | = t
date "+T1ME: %H:%M:%S ZULU ($t :%M E$eT) n
At the other end of the scale. I fo und the
shell 'timel', written by | [ in P14.
It begins in the following column.
P . L . 86-36
The original version of Bob's shell uses
reverse video to set up a rather startling
display on the screen. It will also clobber
your terminal if you try to use it across the
network. If you get the original version, you
could insert a test to see whether the termi-
nal of the user was a network terminal, some-
thing like :
switch "$t"
: [X-Z]
(change to net-friendly version •••)
endsw
depending upon how the network terminals are
labelled on your host. Then all you need is a
second version of those lines that have re-
verse video, replacing them with whatever your
artistic heart desires.
After some discussion, we decided to print
the shell without the inverse video, in the
interests of minimizing the chaos around the
TSS community.
goto start
; Bob Jones, P14, 3369-s
: (574 I-s) — 04 Mar 83
: See list of variables at end of file
: start
date "+%H" | = t
date M +%d n | = d
date "+%j" j = c
expr $t - 5 | = 1
expr $t + 3 j = m
expr $t + 09 | = k
expr $t + 11 | * f
if $k -gt 23 then
expr $k - 24 [ - k
expr $d + 01 | * a
expr $c + 1 | = b
else
expr $d + 0 | = a
expr $c + 0 | = b
end if
if $f -gt 23 then
expr $f - 24 | = f
expr $d + 01 | = g
expr $c + 1 | = h
goto skip
else
expr $c + 0 | * h
- g "$d"
expr $g + 0 | = g
end if
: skip
if "$g" -it ”10" then
- g "0$g"
else
end if
if "$d" -It n 10 n then
- d "0$d"
else
end if
if "$h n -It "100" then
= h n 0$h"
else
end if
if "$b n -It "100" then
= b "0$b"
else
end if
if "$f" -It "10 M then
= f "0$f"
else
end if
if "$k" -It "10" then
- k "0$k"
else
end if
if "$a" -It "10" then
- a "0$a"
else
end if
if "$1" -It "10" then
= 1 " 0 $ 1 "
else
end if
if "$m" -It "10" then
= m "0$m"
Feb 84 * CRYPTOLOG * Page 10
OCID : 4009895
FOR OFFICIAL U B S OHLY
date
echo
"+**
»**
LOCAL
DATE:
%d
%h % y
TIME:
§1 :ZM
(EST)
JULIAN
DATE:
%y%3
**»
**»
date
echo
"+**
11 **
ZULU
DATE:
%d
%h
%y
TIME:
St :%M
(Z)
JULIAN
DATE:
%y%j
**»
**»
date
echo
»+**
»**
MOSCOW—
DATE :
%d
%h
Zy
TIME:
$m:%M
(C)
JULIAN
DATE :
**»
**"
date
echo
"+**
"**
KOREA
DATE:
$a
%h
%y
TIME :
$k. :%M
(I)
JULIAN
DATE:
%y$b
**"
**»
date
echo
"+**
»**
FIJI
DATE:
$g %h
%y
TIME :
$f :%M
(L)
JULIAN
DATE:
%y$h
**"
**"
pump
** **
**********************************************************************
**********************************************************************
~G
I
exit
: 'VARIABLES-(refered to as $t, $m, etc) — t or $t= s system hour; d or $d a! system '
: 'date; c=system Julian Day; l=local time; m=Moscow time; k=Korean time; '
; 'f=Fiji Time; The following are computed if the time is after 2400 — '
: 'a=Korean Date; b=Korean J=Day; g*=Fiji Day; and h*=Fiji J^day. '
: 'Other computations such as 'if $m -It 11 10" then' place a zero in front of
: ' '$m'. This, and the statements such as 'if n $h" -It "100" then' are
: 'required because the math functions will drop leading zeros*
: ' ~G — Rings Terminal Bell'
Bob also has a version of this that runs on
the IBM PC in living color. I'm sure he would
be happy to let you have a copy of either ver-
sion.
These shells are more for demonstration
than anything else, and that is the spirit in
which they are presented here. For example,
the first shell does not add a leading zero
when the local hour is less than ten, and will
probably do something weird if the local hour
is less than 5. The third shell doesn't quite
understand what to do at the end of the month
and the 31st day in the land of ZULU may be-
come the 32nd in some other time zone. If
some reader comes up with a good fix, we will
be happy to print it.
Feb 84 * CRYPTOLOG * Page 11
^ II OFriOIAL UGE ONLY
DOCID: 4009895
E.L. 86-36
5J#A-fflr0jstir#53
In case you were born
on February 29th —
Leap Year Day — well
then. Happy Birthday
to you , too !
Feb 84 * CRYPTOLOG * Page 12
OCID : 4009895
BE PART OF THE PROCESS ing
CRYPTO-LINGUISTIC ASSOCIATION
A LANGUAGE AUTOMATION
/K COMMITTEE
presents
Translator/Transcriber Work Station
Are you now using computer power in your language activities?
Will you be using it soon?
Feeling frustrated, intimidated, or uninformed about language automation
in your office?
At the TWS Work Shop you can
* learn about current and future computer systems
* express your ideas
* share your concerns
4-7 June 1984
2W087
Monday, Tuesday, Wednesday 0830-1100
repeated at 1300-1530 *
Thursday Wrap-up 1300-1500
‘*v
All interested Green-Badge personnel invited
See you there!
Feb 84 * CRYPT0L0G * Page 14
FOR OFFICIAL USE ONLY
OCID : 4009895
FOR OFFICIAL U3E OML Y
AUTOMATED
INFORMATION
SECURITY:
[uj
£ ® E0 EIM T. STEEBLE,ca
rP.L. 86-36
I. Computer Security Guidance
A. Policy Requirements
omputer security requirements derive
from the need for the information
processing system to control access
to classified information. These re-
quirements are described more fully in the DoD
CSC Trusted Computer System Evaluation Cri-
teria , 15 August 1983 [ 1 ] . Briefly, such sys-
tems are required to implement the following:
[] MARKING - An ADP system which is used to
process or handle classified or other
definitely categorized sensitive informa-
tion shall clearly store and maintain the
integrity of classif ication or other sen-
sitivity marking labels for all informa-
tion. The system shall assure that the
classified or other sensitive information
is accurately marked when included in
output from the ADP system.
This article is extracted from the
Department of Defense Computer Security
Center's (DoD CSC ) response to the USMC.
The Marines had requested computer securi-
ty guidance and evaluations of several
architectu ral plans . That pape r was au-
thored by | | Chief of
the Applications E valuations Systems Of-
fice, with aid from \ H \ chi e f
Sci entist ■ DoD C omputer Security Center
and 1 | Col , USAF, Deputy Direc-
tor, DoD Computer Security Center. The
COMSEC policy, p rocedures , and gu idance
were supplied by | | COMSEC
Doctrine and Threa t Assessment Office;
I 1 CQMSEC Standards and
Evaluations Office; and | i |
Jr., COMSEC Applications Office .
For this publication minor editing and
revisions, mostl y to delete USMC I specif-
j'cs, were done by | | Chief,
Operational Systems Evaluation Division,
DoD Computer Security Center.
[] MANDATORY SECURITY - The computer system
must enforce the formal system of infor-
mation control reflected in the security
^classification designation and special
handling restriction set associated with
the sensitive information handled or pro-
cessed by the ADP system together with
the clearance set associated with the
individuals who may request access to the
information.
[] DISCRETIONARY SECURITY - The computer
system must enforce access limitations
placed on classified or other sensitive
information based on identified individu-
als or groups of individuals who have
been determined to have a Need-to-Know
for the information.
[] ACCOUNTABILITY - An ADP system which is
used to process or handle classified in-
formation must account for usage on a
named-individual basis whenever classi-
fied information is generated or ac-
cessed .
[] CONTINUOUS PROTECTION - Security-relevant
portions of a trusted computer system
must be maintained under configuration
control to assure that unauthorized
changes have not been made which could
possibly subvert the. system's ability to
control classified information.
Feb 84 * CRYPTOLOG * Page 15
FOR OFFICIAL U S E ONLY
OCID: 4009895
These policy requirements form the basis for
defining security requirements at the system
level, as well as for the hardware and
software components of the system. They also
determine procedural requirements to support
the continuous protection p'olicy and assure
the operational effectiveness of technical
safeguards .
The degree to which a system must comply
with these requirements, either in the use of
specific security features or in the degree of
assurance that the features are effective, is
a function of risk of exploitation. This risk
depends upon motivat ion , capability , and op-
portunity of an opponent to exploit the
system's protection controls and mechanisms.
These factors, in turn, are influenced by such
things as the most sensitive information in
the system, the least restrictive clearance of
system users or those associated with its
development and operation, the hostility of
the environment, and time.
B. System Requirements
A primary system requirement is to have a
clearly defined security perimeter that in-
cludes a suitable combination of manual and
automatic trusted processes to control access
to classified or sensitive data in the system.
Each such process is designed and operated to
implement a well-defined interpretation of DoD
security policy (e.g., minimally, information
that is labeled SECRET will not be accessible
by personnel holding less than a SECRET clear-
ance). The perimeter may be entirely defined
by environmental ( i .e . , physical , personnel ,
and operational security) controls , as is the
case in a dedicated mode of operation. It may
require hardware, software, and COMSEC con-
trols in addition to the environmental con-
trols. For example, electrically connecting
two different computer systems requires
hardware and software controls over the inter-
faces between systems operating at different
system-high levels. These controls must en-
sure, for example, that the , integrity of clas-
sification labels on internal files is pro-
tected and that information flowing from one
system to another is classified no higher than
the maximum authorized for the receiving sys-
tem. This, in turn, requires assurance that
the integrity of classification labels on
internal files is protected in the computers ,
In the multilevel mode one relies very heavily
on controls internal to the computer to en-
force applicable security policy, and thus the
computer hardware and software controls become
an even more critical element of the security
perimeter.
The specific security requirements, both
technical and environmental, to be enforced by
a computer systems application are prescribed
by the Designated Approving Authority (DAA) ,
in accordance with DoD Directive 5200 . 28 or
DCI Computer Security Directive "Security of
Intelligence Information in Automated Systems
and Networks" (formerly DCID 1/16), while the
requirements for determining the technical ef-
ficacy of the system 1 s security controls and
mechanisms are stated in the Center's Trusted
Computer Systems Evaluation Criteria . The DAA
is then required to make an explicit decision
to use the system operationally when convinced
that these security requirements are satisfac-
torily met. We elaborate below on the com-
puter hardware/ so ft ware certification and ac-
creditation process to support this.
C. Hardware Requirements
Computer systems that are trusted to en-
force a security policy employ a combination
of hardware and software mechanisms. The
hardware mechanisms of concern are those that
simplify and optimize the implementation of
access control over the subjects and objects
as defined in the formal security policy model
abstraction. Below we list desirable features
worth considering in the selection of a
hardware architecture. Note that these
features , while helpful, do not supplant the
need for a security kernel. However, they may
improve performance throughput significantly
over the pure use of software controls.
[] Virtual Memory - This hardware feature is
essential. It can be realized in either
a page- or a segmented-based organization
and would provide an effective environ-
ment for multiple processes. Both re-
quire address mapping circuitry that au-
tomatically provides access checking dur-
ing address translation.
[] Execution Domain - It is minimally essen-
tial that the hardware support two execu-
tion domains (preferably three), where
one domain is privileged and protected
from the less privileged domain. Secu-
rity kernel software runs within the most
privileged domain, and untrusted user
software executes within the less
privileged domain(s).
[] Controlled Access to I/O Devices - It is
essential that computer architecture pro-
vide some mechanism that enables a secu-
rity kernel to maintain control over
accesses to input/output (I/O) devices.
A sufficient solution is the notion of
Feb 84 * CRYPTOLOG * Page 16
DOCID: 4009895
privileged I/O operations. Here, I/O is
performed only by a process executing in
the appropriate privileged domain. The
kernel must control access to this
privileged state .
[] Multiple Processes - Many users normally
share concurrently the available
resources of a general-purpose computer
system, therefore the base computer ar-
chitecture must provide support for an
efficient multiple— process structure.
The minimal hardware support necessary is
the capability to save and restore pro-
cess definition information.
Additional information may be found in MITRE
Technical Report No. ESD-TR-78-170 "Minicom-
puter Architectures For Effective Security
Kernel Implementations" by John D. Tangney ,
dated October 1978.
Because of the reliance one has on these
controls , there are several security concerns
to be addressed in the acquisition and use of
this hardware . One concern is correctness .
Assurances must be given to show that the
hardware mechanisms have been designed and
built to function correctly. A second concern
is rel iabil ity . Failures in the hardware must
not weaken or eliminate the security controls
that are implemented in the hardware itself or
in the software which , in turn , requires
correctly functioning hardware. A third con-
cern is integrity . Configuration control
measures during hardware design, implementa-
tion, operation, and maintenance must deter
accidental or deliberate modifications of the
hardware that can cause security controls to
be bypassed or weakened. The degree of con-
cern in each area and the corresponding steps
taken to reduce the risk is application-
dependent . Although exploiting such avenues
of vulnerability is possible, one must con-
sider them in the context of other areas which
could be more susceptible to attack (e.g.,
software) .
In those cases where the hardware will be
used in a periods processing mode, it should
permit rapid and reliable erasure of all
internal memory (e.g., primary storage, non-
removable secondary storage and buffers). It
must also support the capability for a physi-
cal disconnect from those other devices in
areas with a lesser degree of protection.
There is ongoing research as part of the con-
solidated DoD Computer Security R&D program to
develop a "job stream separator" which au-
tomatically and reliably performs all neces-
sary color change procedures.
In those cases where the computer will
simultaneously process or store information of
different classifications, the hardware should
support internal labeling of files with the
appropriate security classification, and these
internal labels should be used as the primary
basis for access control decisions. This is
particularly the case if the system users are
not al 1 authorized access to all of these
files (e.g., a9 in the controlled or mul-
tilevel mode of operation). A similar re-
quirement may exist for systems which process
personnel proprietary or other sensitive un-
classified information.
Individual hardware components must meet
TEMPEST requirements commensurate with their
operational environment, current policy, and
the perceived threat of exploitation.
Feb 84 * CRYPTOLOG * Page 17
bOCID: 4009895
D. Software Requirements
E . Procedures
Software that must enforce DoD security
policy must be designed, implemented, and do-
cumented to permit credible evaluation and ve-
rification that it, in fact, correctly en-
forces that policy. This requirement would
have to be applied to all system software in-
cluding the operating system, system utili-
ties, data base management systems (DBMS),
compilers, or application software. Such
evaluation would be difficult and lack credi-
bility if the security-relevant mechanisms are
complex and scattered throughout the software.
One simply cannot determine that an unstruc-
tured collection of these mechanisms correctly
implements the policy and cannot be circum-
vented. Thus, the Center requires that in
trusted computer systems all security-related
functions be implemented in well-defined por-
tions of software, firmware, and hardware, the
totality of which is called the trusted com-
puting base (TCB). The TCB must be designed
and implemented so that its security controls
are always invoked and are tamperproof, that
is, the controls cannot be modified or
bypassed by the remaining (untrusted) portions
of the system and that they be of sufficiently
simple design as to be subjected to thorough
test and analysis . During its design and
development , the TCB is subjected to specifi-
cation and design analysis verification and
testing to assure that these properties are
indeed satisfied. The DoD CSC Trusted Com-
puter System Evaluation Criteria amplify these
requirements further.
Determining the specific requirements for
software controls and level of assurance,
i.e., the evaluation class, for a particular
application must reflect the level of risk and
degree of trust required of the hardware and
software. One indicator of this is security
range that is, the difference between the
classification of the most sensitive informa-
tion and the least restrictive user clearance.
Thus, for example, a Class C2 system may pro-
vide adequate trust for a system-high applica-
tion. A multilevel mode application would, on
the other hand, normally be expected to meet
the criteria of a Class B2 or higher system,
depending on its security range.
The continuous protection requirement is
primarily satisfied with procedures to control
and monitor access to hardware and software
security components during their design and
implementation, and then during their opera-
tional life cycle. Such procedures are a
critical part of gaining assurance that the
security mechanisms are designed and built to
meet stated requirements and then maintained
and used to remain effective. Specific re-
quirements include:
[] clearing system support personnel to the
highest level of data in the system;
[] clearing maintenance personnel commen-
surate with the sensitivity of informa-
tion to which they could get access; and
U developing and maintaining software which
protects sensitive information in an en-
vironment consistent with the sensitivity
of the data being protected and with a
level of risk that is acceptable to own-
ers of sensitive information.
In systems which involve periods process-
ing, accreditable procedures are needed to
change processing classification levels. Pro-
cedures include removing sensitive data from
the system, disconnecting or reconnecting
peripheral devices and remote terminals , and
rebooting the appropriate operating system at
the new processing level.
F. Classified Software
The security mechanisms and their implemen-
tation in trusted system hardware and software
are generally unclassified. However, as noted
earlier, this software may be treated as if it
were classified to meet the continuous protec-
tion requirement. There may be instances in
which security-related software is classified
(e.g. , if it implements a classified crypto-
graphic algorithm) or security-related
software contains classified data (e.g., the
routing tables in a message system) . Such
software must be protected like any other
classified information while it is stored in L
the computer. There may be multiple copies of
it in primary and secondary storage, all of
which must be labeled and protected, as must
all hardcopy printouts of it.
Feb 84 * CRYPTOLOG * Page 18
FOR OFFICIAL T . T S B ONLY
DOCID: 4009895
G. General ADP Security Cert ificat ion/ Accreditation
Planning Guide ( reference #2) prov ides add i-
It is DoD policy that all ADP systems which tional information on the critical steps in
process classified information will be ac- the certification/ accreditation process,
credited; that is, there will be an explicit Further direct interaction with the user,
decision that the system adequately protects designer, and C2 could follow the reading of
information and can be used operationally. this literature and enable C2 to work on
This accreditation is frequently based upon a recommending or finalizing a recommended
technical evaluation of the system to deter- secure system,
mine how well it meets predefined require-
ments. However, unless the system is designed
and built to be evaluated, as is NOT the case
with most existing computer systems, the
technical evaluation consists almost entirely
of looking for flaws in the system or conduct-
ing tests of the system's ability to withstand
penetration. Neither case gives assurance II. Telecommunications
that the system is secure because such exhaus-
tive testing never finishes. Thus, it is vi-
tally important that security requirements be A well-defined, layered network security
identified early in the system's development. architecture is needed that
It is equally important that the system secu-
rity architecture identify trustworthy mechan- [] addresses all the threats of concern to
isms to control the flow of information into, the user; and
out of, and within the system. One can then
determine explicitly the policy model which [ ]
each trusted hardware and software component
of this architecture must enforce and the ap-
propriate Trust Class as described in the Cri-
teria. One can then specify, implement, ver-
ify, and certify that those enforcement It is desirable to have a single, layered,
mechanisms that are implemented correctly en- inter-network security architecture that can
force the policy. To assist with this, there be deployed across all DoD certified nets. An
is a growing collection of formal design and ambitious DoD effort is under way to achieve
verification methodologies which can be used. this initiative.
These include SRI ' s Hierarchical Development
Methodology, University of Texas 1 GYPSY sys-
tem, and SDC's Formal Development Methodology.
The C organization is undertaking an effort to III. Policy
make these tools more easily available to and
usable by system developers as well as by NSA
and DoD system test and evaluation organiza- Electrical Interfaces - Electrical inter-
tions . faces between systems operating at different
classification levels must ensure that only
appropriately classified information flows
Computer vendors, (i.e., DEC, UNIVAC, from the more sensitive to the less sensitive
Honeywell, etc.) have developed or are system. It must also prevent users of the
developing trusted systems which might meet less sensitive system from making unauthorized
long-range requirements. Additionally, changes, accidentally or deliberately, to data
software houses are developing add-on packages in the other system or from disrupting its
to provide a little increase in software secu- use. A manual interface has, until recently,
rity (i.e., SKK* s ACF2 , IBM 1 s RACF, CGA 1 s Top been the accepted method. However,
Secret , etc. ) . In Section III below we note trustworthy devices for controlling such in-
other possible uses of trusted systems as part terfaces have been proposed for several sys-
of the security architecture . Thus , a first terns . One such device currently in develop-
step in developing the architectural strategy ment will use the Honeywell SCOMP as a basis
and planning for using trusted systems would for implementing a GUARD to allow SECRET users
be to determine what the long-term security to access SECRET data bases on the US Army
requirements are (i.e. will multilevel secu- Forces Command's Top Secret system-high WWMCCS
rity become an operational necessity, and if computer. There is another approach which
so, over what range of classification and user uses a cryptographically derived cryptographic
clearance?). check to verify the releasability of informa-
tion when it is being electronically trans-
ferred between security perimeters (reference
#3).
is consistent with, or is at least not
incompatible with, the security architec-
tures of networks to which various users
are connecting.
Feb 8A * CRYPTOLOG * Page 19
CID : 4009895
T OR O FF ICIAL UOC OHLV
*-Property[2] - DoD security policy for ADP
systems was discussed in Section I above. The
*-property is one part of the Bell & La Pa-
dula[3] policy model for mandatory security.
It is more conservative than DoD policy as it
relates to paper documents but it precludes
the success of Trojan Horse attacks.
Data Aggregation - DoD policy for correct
classification and handling labels for data
elements (alone or in aggregate) should be im-
plemented in data processing systems. This
requires reliable labels on internal files and
on output giving the classifications or other
special handling instructions, as determined
by the owner of the information at the field,
record, file, or data base level, as appropri-
ate.
Data Encryption Standard (DES) - Present
policy requires that NSA approve, on a case-
by-case basis, any proposed use of DES to pro-
tect classified communications. With respect
to the use of DES to protect unclassif ied, na-
tional security-related communications, re-
cently issued national policy requires that
Services, Departments, and Agencies determine
the risk of exploitation of their unclassified
communications, either in consultation with or
based upon prior guidance from NSA in accor-
dance with Federal Standard (FS) 1027. Where
there is high risk of exploit at ion, NSA will
prescribe or approve the cryptographic system
used, on a case-by-case basis. For all other
applications , commercial cryptographic systems
(to include DES) may be used if they have been
endorsed for general application by NSA.
IV. General
There will be additional costs associated
with implementing, using, and maintaining phy-
sical, emanations, personnel, and procedural
security safeguards. Some of this additional
cost (e.g., for physical and emanations safe-
guards) is part of the capital investment. On
the other hand, the costs for personnel and
procedural safeguards are part of the opera-
tional costs. The actual costs for a facility
depend upon the level of protection required
for the information being processed in a given
threat environment. There will also be addi-
tional costs associated with acquiring and us-
ing trusted computer systems. Designing secu-
rity into the system can lower these costs and
have a beneficial payoff through improved re-
liability and maintainability which results
from a well-structured software design and im-
plementation. We note that there are two key
aspects to be considered in estimating the
cost of safeguards in these security areas.
They are (1) what level of protection is re-
quired, and (2) how must these, safeguards be
used and maintained to ensure their continued
effectiveness?
[Doesn't protection of
and products require this?
sources,
EFS]
methods ,
Footnotes
1. This and the other referenced papers can
be obtained from the DoD CSC Technical
Library (C422).
2. Pronounced "star property"
3.
[was recently hired as Deputy
Chief of C3.
P.L. 86-36
Bibliography
1. Trusted Computer System Evaluation Cri-
teria, CDC-STD-001-83, 15 Aug S3 “fs 3
225,711).
2. ADP Security Cert if icat ion / Accreditation
Planning Guide , undated.
3. On the Feasibility of Connecting RECON to
an External Network , | ""|
dated 16 Mar 8.1 .
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 20
FOR OFFICIAL USE ONLY
DOCID:
EO 1 . 4 . (
P.L. 86-
feO‘4..- 4 .
P.L. 8 6-
EO
P.L
4009895
c)
■36
EO 1.4. (c)
P, . L . 86-36
SECRET
(c)
-36
CRYPTOLOG
1983
INDEX CU)
t> , Ij . 86-36
TITLES
Acronymania; Hoy 83 f
Ada News; Jan $3;Q"
Ada: Conquering the Tower of Babel; Jan 83;
Jf
J Apr 83 ;[
Announcement: Contributions Solicited for
CRYPTOLOG Articles; Sep 83;
Announcement: KRYPTOS Society Spring Meeting;
Mar 83;
Announcement: Request for Copies of Jan-Feb 83
Issue (CISI Essay Contest); Aug 83;
Announcement: Students! (NCEUR Independent
Study Programs); Mar 83;
Announcement : Two New Lan guage _Ajds| I
1 ( and Chinese-Engl ish) ; Jun 83;
The following is a cumulative index of
CRYPTOtOG (Vol X , 1985) and is in three
parts, by title, by author, and by key-
word. Items in multiple issues (January-
February 1983, for example) are indicated
by the first month (i.e., by Jan 83).
Cumulative Index (1974-1982), Part 1: Authors;
Mar 83 ;
Cumulative Index (1974-1982), Part 2: Titles;
Apr 83; ....■■■■ ;/ ‘5 . L . 8 6-3(
Cumulative Index (1974-1982) , Part 3:
Keywords; May 83;
DCL; The Direc t Communications Link; Dec 83 ;
Do You Know the Differences?; Jun 83; | \ \ |
D.S.
Do You Really Mean Julian?; Sep 83; |
C .
Does Your Office^ Make You Sick?; Aug 83;
1
E.T. At NS A; Mar 83;
FBIS Latin American Reference Aid; Apr 83;
11975-77 ; Sep 83: I I
1982; Sep 83;|_
] Apr 83;
5-4-^^dzz^^^ Nov 83; 'Watt Zizn ame 1
Foreign Microwave Radio; Sep 83: 1 I
Frontier Dentist; Apr 83;
'Marian D . Librarian'
The Futu re Brightens fo r Flat-Panel Displays;
Jan 83:1 \
Getting Personal; Jan 83; | |
Government of the People , By The Party, Fo r
The Leadership; Apr 83 >| I
] Jun
*; ! ~l~
I Remember jfk; nov 83; H.G.R
I Remember Mabel Babel; Aug 83 Q
| | __ 0 , . , Improving Raster G raphics Ima ges
Bann ers. Cowboy Ha ts, and ELINT Notations; Oct Aliasing ; Jan 83 ; | |
83; I I
1
v.L . 8 6-36
The Case of the ' Fowled-Up' CRITIC; Aug 83;
0 , I 1 I
The Intelligence Watch Officer; May 83; |
L.S.
I l l . .
J Nov 83 ; ^
The Islamic Time Bomb; Dec 83 ;|
Computer Graphics to Enhance Collection
Management; Jan 83
Computerizing T raffic Analysis; May 83;
Confessions of a Briefer; May 83|; |
if
omputerizing of TA,
1
Correction: Do Ybu Know the Differences? ,
Jun-Jul 83 Issue; Aug 83;
Correction: October 1983 CRYPTOLOG Issue Add
to Classification: 'REL UK CAN AUS NZ'; Dec
83; jl
Crisis Management: Remarks; Oct 83; | |
L.D. ii /
Cryptic Crossword #3; Mar 83: 1
Cryptography At GLOBECOM 82; May 83,;[
J. A.
F.W
Letter to the Editor:
May 83 Issue; Nov 83
Letter to the Edito r: Governme nt of t£g) 1 . 4 . (d)
^People... reply toj | letter^ ^ug §%J_ 36
Letter to the Editor: Government of the
People. . . , Apr 83 Issue; Aug 83;
Letter to the Editor: Management of
Coordination, Sep 83 Issue ; Oct 83;
'Juan Tuthri 1
Letter to the Editor: My S taff — It Comfort s
Me, Apr 83 Issue; Aug 83 ; | |
] Letter to the E ditor: Out of My Depth, May 83
Issue; Aug 83; | |
1.4. (c)
. 86-36
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 21
DEOIIET
OCID : 4009895
JEORET
M . L . 8 6-36
/yfevL. 8 6-36
Letter to the Editor: Redb aron, i Road run ner . . ■ ,
Jun-Jul 83 Issue; Sep 83 : 1'' / / / 1 1 \
Letter to the Editor: . Classified
Information; Jun 83; I ^ I
Letter to the Editor: The Tower of Babel; May
83; Mo Hick J.J. | \
Letter to the Editor: Tips on Topical
Reporting, Oct 83 Issue; Dec 83; \
Letter to the Editor : Tips on Topical
Reporting, reply to l ~"T letter;
Dec 83;
Letter to the Ed itor: UNIX ED (I) Manual Page
Comment ; Oct 83 J I
Letter to the Editor: Video Teleconfere ncing,
Mar 83 Issue; Jun 83 ; J i |
The Literary Bends; Noy 83; Murphy jA. I.
Logic De sign Exceeding Boolean Capabilities;
Jan 83 ; | f
MBTI: The Management Tool of the Future; Nov
83; l ~l
Man Does Not Live By Matzos Alone; Apr 83;
'Marian D. Librarian 1 ^
Management of Coordination; Sep 83; I
Managing Ou r Systems for Performance
; Jan 83;
Menu Selection As A T ool for Human/Ma chine
Interaction; Jan 83: 1 ~ 1
Mar 83; |
1 Dec 83:1 ~
More on Passwords; Mar 83 ; | |
My Staff — It Comforts Me; Apr 83; 'Zebulon
Zilch'
NSA in The Space Age; Apr 83 ; |
The NSA High-level Display File; Jan 83;
I I
^NSA-Crostic No. 4b; Apr 83; williams D.tT.
NSA-Crostic No. 47; May 83; Williams D.H.
NSA-Crostic No. 48; Jun 83; Filby V.R.
NSA-Crostic No. 49; Aug 83; Williams D.H.
NSA-Crostic No. 50; Sep 83; Williams D.H.
NSA-Crostic No. 51; Dec 83; Williams D.H.
1982 Local Area Network Status; Jan 83 : I
E.M. /'
Non Posse vs. Posse Non; Dec 83; P
H.G.
On How The 'Game' of the Agency Should Be
Played; Sep 83; Santiago-Ortiz R.
Out of My Depth; May 83; • L • 8 6-36
Out of My Depth; Dec 83;
PARPRO : Reconnaiss ance Programs ; Sep 83 ;
Picture: What Is The Caption?;! Nov 83;
Punching The Biological Timeclbck; Jun 83;
Puzzle; Jan 83; Williams D.H.
Redbaron, Road r unner, Bronzs tar : What's In A
Name?; Jun 83; | |
Review: The Battle For The Falklands; Aug 83;
Review: Digital Telephony; May 83;[
J.A.
SIGINT Challenge: A Scenario; Mar 83 : I
J.L. \\
Shell Game: System Shells; pec 83 ; |
W.E.
Shell Using If; Mar 83: 1 Y 1
Some Tips on Getting Promoted^ Jun 83; \
v. ' / Y\
Soviet Military Goals/ And Their Effect on
Negotiations for Arms Limitations; Oct 83;
Soviet Psi Experiments; Dec 83 ; L_ |
Specifying Colors for Computer Graphics ; Apr
83; l I
Static Magic: The Wonderful World of Tempest;
Nov 83; Donahue T.M. \
Still More About Passwords; May 83 j \ |
M.E.
A Survey of Parallel Sorting; Jan 83 ; Q
S.B.
TDY Travail; Mar 83; Filby V.R. \\\
TELECOM 83:; Oct 83; I I \
Tempest for Every Office; Nov 83 ; | \ |
Thousands Miss Demonstration; Oct 83 ; | |
R . L .
Tips on Topical Reporting; Oct 83; | |
A Tutorial on Color Theory and Human Color
Percept ion for the Col or Graphics Programmer;
Jan 83; I I
UIS: Us er Interface Sy stem Part One: Concept;
A P r 83 < J . L . 8 6-36
UIS : U s e r In t er face S y stem Part >:
Architecture; Apr 83; | |
V ideo Teleconferencing : NSA Appl ica t ions ; Mar
si ! I
Weathef : A Key Intelligence Indicator; Maf 83;
The White House la Singing Our Song; Nov 83;
Murphy A. I. \
Why Pascal? (Why Not? ) ; Jun 83 ; | 1
Word People at NSA;! Apr 83; 'Dickson Airy*
Wrangler. . .One Tough Customer; Sep 83;
EO 1 . 4 . (c)
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 22
0E0RCT
DOCID: 4009895
SECRET
86-36
'Zebulon Zilch'
Apr 83 My Staff — It Comforts Me
Mar 83
Dec 83 DCL; The Direct Communications Link
Jun 83 Letter to the Editor: Video Telecon-
ferencing, Mar 83 Issue
AUTHORS fuj
Mar 83 Announcement: KRYPTOS Society Spring
Meeting
Mar 83 Announcement: Students! (NCEUR
Independent Study Programs)
Mar 83 Cumulative Index (1974*1982), Part;l:
Authors
Mar 83 E.T. At NSA
Apr 83 Cumulative Index (1974-1982), Part 2:
Titles
Apr 83 FBIS Latin American Reference Aid
May 83 Cumulative Index (1974-1982), Part 3‘>
Keywords y p T « ^
May 83 Out of My Depth
Jun 83 Announcement : T wo New Language Aids
| | and Chinese-English)
Aug 83 Announcement: Request for Copies of
Jan-Feb 83 Issue (CISI Essay Contest)
Aug 83 Correction: Do You Know the
Differences?, Jun-Jul 83 Issue
Sep 83 Announcement: Contributions Solicited
for CRYPTOLOG Articles
Nov 83 Picture: What Is The Caption?
Dec 83 Correction: October 1983 CRYPTOLOG
Issue Add to Classification: 'REL UK
CAN AUS NZ*
Dec 83 Out of My DepthEO 1 .4 . ( c)
P.L. ’8 6-36
'Dickson Airy'
Apr 83 Word People at NSA
' Juan Tuthri 1
Oct 83 Letter to the Editor: Management of
Coordination, Sep 83 Issue
'Marian D. Librarian 1
Apr 83 Frontier Dentist
Apr 83 Man Does Not Live By Matzos Alone
"H.G.R"
Nov 83 I Remember JFK
'Watt Zizname'
Nov 83 5-4-3 Puzzle
Aug 83 The Case of the 'Fowled-Up* CRITIC
Oct 83 Tips on Topical Reporting
Dec 83 Letter to the Editor: Tips on Topical
Reporting, reply to Day's letter
Jan 83 Ada: Conquering the Tower of Babel
l .
Mar 83 Cryptic Crossword #3
!
Jun 83 Punching The Biological Timeclock
Mar 83 More on Passwords
Apr 83 Specifying Colors for Computer Graph-
ics
May 83 Still More About Passwords
Aug 83 Does Your Office Make You Sick?
Nov 83 MBTI: The Management Tool of the Fu-
ture
Jun 83 Punching The Biological Timeclock
Dec 83 Letter to . the Editor: Tips on Topical
Reporting, Oct 83 Issue
Reconnaissance Programs
Nov 83 Static Magic: The Wonderful World of
Tempes t
Mar 83 Weather: A Key Intelligence Indicator
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 23
1 1
Nov 83
EO 1 . 4 . (c)
P.L. 86-36
S ECRET
PC ID: 4009895
-8 E0RET
& . L . 86-36
. 8 6-36
Oct 83 Thousands Miss Demonstration
Dec 83 The Islamic Time Bomb
Faurer L.D.
Oct 83 Crisis Management: Relnarks
Jan 83 Ada News
Filby V.R. .
Mar 83 TDY Travail
Jun 83 NSA-Crostic No. 48
Oct 83 Letter to the Editor: UNIX ED (i)
Manual Page Comment
I
Apr 83 NSA in The Space Age
l
Nov 83 Tempest for Every Office
Mar 83 SIGINT Challenge: A Scenario
Jun 83 Redbaron, Roadrunner, Bronzstar:
What r s In A Name?
Jan 83 Improving Raster Graphics Images by
Anti-Alias ing
EO 1.4. (c)
Jan 83 Getting Personal ^ ^ ^ ^
Apr 83 Government of the People, By The
Party, For The Leadership
Aug 83 Letter to the Editor: Government of
the People... reply to | I
letter
Aug 83 Letter to the Editor 1 : Government of
the People..., Apr 83 issue
Sep 83 Management of Coordination
Nov 83 Acronymania
May 83 Confessions inf £%r?£fer
Apr 83 UIS: User Interface System Part One:
Concept
Apr 8 3 1 |
May 83 Cryptography At GLOBECOM 82
May 83 Review: Digital Telephony
Aug 83 Review: The Battle For The Falklands
Sep 83 Foreign Microwave RfiHol . 4 . (c)
Oct 83 TELECOM 83: P.L. 8 6-36
Dec 83 Soviet Psi Experiments
May 83 Letter to the Editor: The Tower of
Babel
Jan 83 A Survey of Parallel Sorting
P.L. 86-36
Jun 83 Some Tips on Getting Promoted
I ..... " EO 1.4. (d)
Nov 83 Letter to the Editor: Computerizing
of TA, May 83 Issue
Sep 83 Do You Really Mean Julian?
Murphy A.I.
Nov 83 The Literary Bends
Nov 83 The White Rouse Is Singing Our Song
Jan 83 Computer Graphics to Enhance Collec-
tion Management
Mar 83 Shell Using If
Aug 83 Letter to the Editor: Out of My
Depth, May 83 Issue
Jan 83 The Future Brightens for Flat-Panel
Displays
Jan 83 1982 Local Area Network Status
Jun 83 Why Pascal? (Why Not?)
Jun 83 Do You Know the Differences?
Oct 83 Soviet Military Goals And Their Ef-
fect on Negotiations for Arms Limita-
P.L. 86-36
Mar 83 Is The Glass half Empty Or Half Full?
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 24
GEGRET
,
DOCID: 4009895
fe.L. 86-36
I I
SECRET
Jun 83
Aug 83
I Remember Mabel Babel
]
/P.L. 8 6-36
Sep 83 Wrangler ...One Tough Customer
Aug 83 Letter to the Editor: My Staff — It
Comforts Me, Apr 83 Issue
Dec 83 Non Posse vs. Posse Non
Jan 83 Menu Selection As A Tool for
Human/Machine Interaction
Sep 83 Letter to the Editor: Redbaron,
Roadrunner. . . , Jun-Jul 83 Issue
Sep 83' On How The 'Game' of the Agency
Should Be Played
Jan 83 The NSA High-level Display File
1
Jun 83 Letter to the Editor: Security of
Classified Information
Williams D.H.
Jan 83 Puzzle
Apr 83 NSA-Crostic No. 46
May 83 NSA-Crostic No. 47
Aug 83 NSA-Crostic No. 49
Sep 83 NSA-Crostic No. 50
Dec 83 NSA-Crostic No. 51
Jan 83 Computer Graphics to Enhance Collec-
tion Management
EO 1 . 4 . ( c )
P.L. 86-36
Apr 83 UIS: User Interface System Part Two;
Architecture
Jan 83 Logic Design Exceeding Boolean Capa-
bilities
Dec 83
Mar 83 Video Teleconferencing: NSA Applica-
tions
]
May 83 The Intelligence Watch Officer
L
P.L. 86-36
Jun 83
I
D
Oct 83 Banners, Cowboy Hats, and ELINT Nota-
tions
]
May 83 Computerizing Traffic Analysis
Dec 83 Shell Game: System Shells
Sep 83
Sep 83
Jan 83 Managing Our Systems for Performance
Jan 83 A Tutorial on Color Theory and Human
Color Perception for the Color Graph-
ics Programmer
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 25
DEORET HANDLE VIA 00MIHT OllAN N ELO ONLY
pOCID: 4009895
KEYWORDS (U)
OEORET
Pv:L>... 8 6-36
Acronyms
Nov 83 Acronymania;]
]
Ada
Jan 83 Ada News£
:
[
Jan 83 Ada: Co nquering the Tower of Babel;
_ \ KO 1.4. (c )
P.L. 86-36.
Apr 83
]
Aircraft
Sen 83 PARPRO: Recon naissance Programs;
Book Review P,L " 86-36
Apr 83 Frontier Dentist;
'Marian D. Librarian 1
Apr 83 Man Doe9 Not Live By Matzos Alone;
'Marian D. Librarian 1
Aug 83 Review: The Battle For The Falklands;
I 1 P.L. 86-36
Briefing
May 83 Confessions of a Briefer; Hankey J.
CAA News
Oct 83 Crisis Management: Remarks; Faurer
L.D.
Capt ion
Nov 83 Picture: What Is The Caption?;
Chinese
Jun 83 Announcem ent : Two New Language Aids
I 1 and Chinese-English) ;
Classification
Jun 83 Do You Know the Differences?; Rankin
D.S .
Aug 83 Correction: Do You Know the
Differences?, Jun-Jul 83 Issue;
Dec 83 Correction: October 1983 CRYPTOLOG
Issue Add to Class i f icat ion : ' REL UK CAN AUS
NZ 1 ;
36-36
Collection
Jan 83 Computer Graphic s to Enhance
Col lent inn M anagement ; |
83 Is T he Glass Half Empty Or Half Full? >
Nov 83 f
Dec 83 Modernization of G Grbup's Hi gh-;
Frequency Intelligence Collections; !
W.G.
Color
Apr 83 Spe cifying Colors for Computer
Graphics;].
P.L. 86-36
E0-..1 . 4 . (c)
P.L. 86-36
COMINT
Mar 83f
[
-L
8 6-36
Communications •
Sep 83 Foreign Microwave Radio ; |
Dec 83 DCL; Th e Direct Communications Link;
Computer Applications
Jan 83 A Survey of Parallel Sorting;
S.B .
Jan 83 Computer Graphic s to Enhanc
Collection Management ;
i y
Jan 83 The NSA H igh-level Display File;
}.
Mar 83 r
1 -■■■ . , .
Mav 83 Compute!
rizing Traffic Analysis^ ’
I? . L . 86-36
Computer Graphics
Jan 83 A Tutorial on Color Theory and Human
Color Perce ption for the Color Graphics
Programmer ; | H
Jan 83 Computer Graphics to Enhance
]
^Collection M anagement;^
Jan 83 Improvi ng Raster Gr aphics Iriiages by
Ant i- Alias ing j |
Jan 83 The NSA H igh-level Display File;
Apr 83 Specifying Colors for Computer
P.L. 86-36
Graphics ; Q
7
Computer Networks
Jan 83 1982 Local Area Network Status;!
E.M. L
Apr 83 I
Computer Programm ing
Jan 83 Ada News ; ^
]
^Jin 83 Ada: Co nquering the Tower of Babel;
Jan 83 Menu Selection As A Tool for
Human/Machine Ihterac tion; | |
Mar 83 Shell Using If ; I I
Jun 83 Why Pascal? ( Why Not?): !
Dec 83 Shell Game: System Shells; C
W.E.
Computer Security \ \
Mar 83 More on Passwords: !
May 83 Cryptography At GL0BEC0M 82 ;L
J .A.
May 83 Review: Digital Telephony;
J . A.
May 83 Still More About Passwords; D* Xmperio
M ‘ E ‘ .. P.L. 86-36
EO 1 . 4 . (c)
P.L. 86-36
EO 1 . 4 . (c)
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 26
GEORET
DOCID :
4009895
P : , L i--. . 8 6-3 6
Computer Systems
Jan 83 Getting Personal; |_
3
Apr 83 U lS: User Interf ace System Part One:
Concept I I
Apr 83 UIS: User Interface System Part Two:
Architecture ; |
Sep 83 Wrangler .. .One Tough Customer;
i i
Computer Systems Management
Jan 83 Mana ging Our Systems for Performance;
Computer TA
Nov 83 Letter to t he Editor: C omputerizing of
TA, May 83 Issue; !"" |
Coordination
Sep 83 Management
of Coordination;!
Oct 83 Letter to the Editor: Management of
Coordination, Sep 83 Issue; 'Juan Tuthri'
Covername
Jun 83 Redbaron, Ro adrunner, Bro nzstar :
What’s In A Name?; | |
Sep 83 Letter to the aaitor: Kea baron,
Roadrunner..., jun-Jul 83 Ijdue; |
3
CRITIC
Aug 83 The Case of the 1 Fowled-Up 1 CRITIC;
I f -
CRT
Jan 83 The Future Brigh tens for Flat-Panel
Displays ; Q
1 -
Crypto-TA
May 83 Out of My Depth;
Aug 83 Letter to the Edit or: Out of My Depth,
May 83 Issue; Q
Dec 83 Out of ”
P.L.
] 6-36 /
3
My Depth;
Cryptography
May 83 Cryptography At GLOBEC0M 82;
J . A. //
May 83 Review: Digital Telephony;
j . a. j : ! a
Oct 83 TELECOM 83: ;[
v p;. L. .8 6-3-6
CRYPTOLOG
Mar 83 Cumulative Index (1974-1982), Part 1:
Authors ;
Apr 83 Cumulative Index (1974-1982), Patt 2:
Titles ; // /
May 83 Cumulative /Index (1974-1982) , Part 3:
Keywords ; \
Aug 83 Announcement : Request for Copies of
Jan-Feb 83 Issue (CIS I Essay Contest);
Sep 83 Announcement : Contributions Solicited
for CRYPTOLOG Articles;
Dec 83 Correction: October 1983 CRYPTOLOG
Issue Add £6 Classification: ’ REL UK CAN AUS
NZ* ;
EO 1 . 4 . ( c )
P.L. 86-36
Data Security
Jun 83 Letter to the Editor: Sprnr
Classified Information
TP. L. 8 6-36
ty of
Data Standards
Sep 83 Do You Really Mean Julian?;
C.
ELINT
^Spn 83 Wrangler. ..P up Tough Customer;
Oct 83 Bann ers. Cowboy H ats, and ELINT
Notations : l I
English
Aug 83 I Remember Mabel Babel;
ESP
Dec 83 Soviet Psi Experiments ; |_
Mar 83 Is The Glass Half Empty Or Half Full?;
i , i
Apr 83 Field Station Network Applications :
I l
Oct 83 Thousands Miss Demonstration;
R - L - P.L . 86-36
Greek
Jun 83 Announcement: Two New Laneuagg^Aids
HF
Dec 83 f
I
1
W.G .
History
Nov 83
1=
P.L. 86-36
Zl
Hotline
Dec 83 DCL; The Direct Communications Link;
l
1
Human Factors
Jan 83 Menu Selection As A Tool for
Human/Machine Interaction; ^
Apr 83 Spe cifying Colors f or Computer
Graphics ; I ~~1
Jun 83 Punrhino Thp Rinl noTi cal TimprlOrk;
Creswell D.T. l 1
Aug 83 Does Your Office Make YOU Sick?;
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 27
SECRE T —
OCID : 4009895o,i-4. (c)
t ' . L . 8 6-3 6
- OEORB T-
HUMINT -
Jun 83
Humor
Apr 83 Frontier Dentist;
'Marian D. Librarian 1
Apr 83 Man Does Not Live By Matzos Alone;
'Marian D. Librarian 1
Apr 83 My Staff — It Comforts Me; ' Zebulon
Zilch 1
Apr 83 NSA in The Space Age; |
Apr 83 Word People at NSA; 'Dickson Airy*
May 83 Letter to the Editor: The Tower of
Babel : l I
Aug 83 Letter to the Editor: My Staff — It
Comforts Me, Apr 83 Issue;f
Management
Sep 83 On How The ' Game 'of t h e Ag en c y Should
Be Played; Sant iago-Ortiz R.
Oct 83 Crisis Management: Remarks ; Faurer
l.d . y / // !\ \
Nov 83 MBTI : The Managem ent Tool of the
Future: ! I
Mathematics
Jan 83 Logic Deai?n Exrpf
Capabilities ; |
Microcomputers
Jan 83 Getting Personal;!
Microwave
Sep 83 Foreign Microwave Radio ;[
ling Boolean
Index
Mar 83 Cumulative Index (1974-1982), Part 1:
Authors ;
Apr 83 Cumulative Index (1974-1982), Part 2:
Titles ;
May 83 Cumulative Index (1974-1982), Part 3:
Keywords ;
Indicators
:: A Key Intelligence Indicator;
Mx
Jan 83 Logic D esic
Capabilities; |
ling Boolean
T / EO 1 • i 4 ■ (c)
J / P\ L . 86-36
Mar 83 Announcement: Students! (NCEUR
Independent Study Programs);
Nov 83 The Literary Bends; Murphy A. I ..
Nov 83 The White House Is Singing Our Song;
Murphy A. I.
Iran
Dec 83 The Islamic Time Bomb;
f I# 1
P . L„. 86-36
Islam
Dec 83 The Islamic Time Bomb;
F.W.
! Aug si
The Case of the 'Fowled-Up' CRITIC;
1 1 P.L. 86-36
KRYPTOS News
Mar 83 Announcement: KRYPTOS Society Spring
Meeting;
Language
Jun 83 Announcem ent : Two New Language Aids
I land Chinese-Enelish) ;
Jun 831
I — r r ,
Aug 83 I Remember MabeT Babel I
Latin American
Apr 83 FBIS Latin American Reference Aid ;
Linguists .
Dec 83 Non Posse vs. Posse Non;
H.G. 1
Logic
Jan 83 Logic D esign Exceed ing Boolean
Capabilities ; | |
EO 1.4. (c)
P.L. 86-36
EO 1 . 4 . (c)
P.L. 86-36
May 83 The Intelligence Watch Officer; T
T P I I
Mar 83f
Pascal
Jun 83 Why Pascal? (Why Not;?); T
Password : /
Mar 83 More on Passwords ; |
May 83 Still More About Passwordsjf
M.E.
Performance
fimeclock;
Aug 83 Does Youf Office Make You Sick?;
Personality j
Mar 83 E.T. At NSA;
Apr 83 Word People at NSA; -D ickson Airy*
Aug 83 I Remember Mabel Babel j
Nov 83 I Remember JFK; H.G. R
Promotions I//
Jun 83 Some Tips on Getting Promoted ; \
V. . 1
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 28
SECRET
>OCID
4009895
Puzzle
Jan 83 Puzzle; Williams D.H.
Mar 83 Cryptic Crossword #3; Q
SECRET
/: #L" L. 8-6.-.S6
I
Dec 83 Letter to the Edit or: Tips o h Topical
Reporting, Oct 83 Issue "1
Dec 83 Letter to the Editor: Tips on Topica l
Reporting, reply to Day's letter; | ~|
D.G. E,O l 1 . 4 . (c)
PXL. 86-36
Satellites
Apr 8 3 1
Security
Jun 83 Do You Know the Differences? ; f
D.S.
Jun 83 Letter to the Ed itor: Securi ty of
Classified Information: ! \
Aug 83 Correction: Do You Know the
Differences?, Jun-Jul 83 Issue;
SIGINT
Mar 83 SIGINT Challenge: A Scenario^
J.L.
Sorting
Jan 83 A Survey
S.B.
of Parallel Sorting;
8 6-36
ezi
Soviet
Apr 83 Government of the Pe ople, By The
Party, For The Leadership; Q”
Aug 83 Letter to the Ed itor: Govern ment of
]
the People... r eply to
letter;
Aug 83 Letter to the Editor: Government o f
the People... > Apr 83 IsAue^ f I
Oct 83 Soviet Military Goals And ThOi r Effect
on Negotiations for Arras Limitations i
G.L.
Dec 83 Soviet Psi Experiments;
Spanish
Jun 83 T
i =r
Apr 83 NSA-Crostic No. 46; Williams D/H.
May 83 NSA-Crostic No. 47; Williams D f H-
May 83 Out of My Depth;
Jun 83 NSA-Crostic No. 48; Filby V.R.
Aug 83 Letter to the Edito r: Out of My Depth;
May 83 Issue; I I
Aug 83 NSA-Crostic NOi 49; Williams D.H.
Sep 83 NSA-Crostic No. 50; Williams D.H.
Nov 83 5-4-3 Puzzle; 'Watt Zizname r
Dec 83 NSA-Crostic No. 51; Williams D.H;
Dec 83 Out of My Depth;
Reconna i s s anc e
SeD 83 PARPRO: Reconnaissance Programs;
I I /
Reporting
Aug 83 The Case of the 'Fowled-Up* CRITIC;
I I . r
Oct 83 Tips on Topical Report ing;|_
Dec 83 Non Posse vs. Posse Non;
H,G.
Staff
Apr 83 My Staff — It Comforts Me; 1 Zebulon
Zilch
TDY
Mar 83 TDY Travail; Filby V.R.
TELECOM
Oct 83 TELECOM 83: ; [~
Tempest
Nov 83 Static Magic: The Wonderful World of
Tempest; Donahue T.M.
Nov 83 Tempest for Every Office;
Terminology
Sep 83 Do You Really Mean Julian?;
C.
Time
Sep 83 Do You Really Mean Julian?
C.
Traffic Analysis
May 83 Compute rizing Traffic Analysis;
Nov 83 Letter to t he Editor: Computerizing of
TA, May 83 Issue;]
Training
Mar 83 Announcement: Students! (NCEUR
Independent Study Programs);
UIS
Apr 83 UI S: User Interfac e System Part One:
Concept; I 1
Apr 83 UIS: Us er Interfa ce System Part Two:
Architecture; | |
UNIX
Mar 83 Shell Using If; H
]
Oct 83 Letter to the Editor: UNIX ED (I)
Manual Page Comment ; | l
Dec 83 Shell Game: System Shells;
W.E .
Video Teleconferencing
Mar 83 Video Teleconferencing: NSA
Appl ications ; Snodgrass C.L .
Jun 83 Letter to the Editor: Video
Teleconferencing, Mar 83 Issue;!
J.R. W i
Weather
Mar 83 Weather : A Key Intelligence Indicator;
P.L. 86-36
Writing
Nov 83 The Literary Bends; Murphy A. I.
Nov 83 The White House Is Singing Our Song;
Murphy A. I,
■ 4 . ( c)
86-36
P.L. 86-36
Feb 84 * CRYPTOLOG * Page 29
Pl-Jun 84-S3-52043
— SEGUE ? —
SECR ET-